Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 21:38
Behavioral task
behavioral1
Sample
discord ip grabber setup.exe
Resource
win7-20240221-en
General
-
Target
discord ip grabber setup.exe
-
Size
3.1MB
-
MD5
125f0ea22dfd428a7f63bdca9049e089
-
SHA1
b1850e5701416ffd91d6a05058af265a02ebbcdf
-
SHA256
3d5f49779d8e932ed12ea1db7b60cdf49b1aa909cc30a279a8732332af274f4d
-
SHA512
7a830485cb848c1888705a7519c4dc09ce84ee8a87f282917687077ca97b1b448e9a4a2384b44f22e2cc061e3f75b1cdaf8a36953c00dd282aaf14950c1f2c2b
-
SSDEEP
49152:yviI22SsaNYfdPBldt698dBcjHD4mAmzXLoGdqETHHB72eh2NT:yvv22SsaNYfdPBldt6+dBcjHD4mda
Malware Config
Extracted
quasar
1.4.1
image
192.168.0.108:4782
3238cac0-2b8d-4786-98d4-94ba3b0d3169
-
encryption_key
6E340CD4BC59938B28E8EDCB44F294C2659196F8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
antivirus startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4120-1-0x0000000000380000-0x00000000006A4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
discord ip grabber setup.exedescription pid process Token: SeDebugPrivilege 4120 discord ip grabber setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
discord ip grabber setup.exepid process 4120 discord ip grabber setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
discord ip grabber setup.exepid process 4120 discord ip grabber setup.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
discord ip grabber setup.exedescription pid process target process PID 4120 wrote to memory of 3460 4120 discord ip grabber setup.exe schtasks.exe PID 4120 wrote to memory of 3460 4120 discord ip grabber setup.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\discord ip grabber setup.exe"C:\Users\Admin\AppData\Local\Temp\discord ip grabber setup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "antivirus startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3460